AT&T understands the complexities of the academic environment and the
monumental challenges faced by academic CIOs. To meet these demands, we
provide a wide range of cost-effective security solutions designed to protect
educational institutions from the attacks they are most vulnerable to,
including unauthorized access, email and web-borne malware, IM malware,
viruses, just to name a few. Let AT&T’s certified security experts
perform the 24x7 management of your organization’s network.

You have many users accessing your network in many different ways, some of
the most common include email, instant messaging (IM), and web access through
surfing, downloads, etc. AT&T Email and Web Security services
are designed to help you ensure that emails, IM’s and web downloads are scanned
and filtered for viruses and malware, control what sites your users may access,
manage music and video streaming from the web, and ensure the privacy of your
most sensitive emails and email attachments from unauthorized access.

You have every day external threats borne from the web, including DDoS
attacks, malware, viruses and network intrusions (IDS). Most security solutions
call for placing firewalls and intrusion detection devices at each premise
point that has access to the internet. This can be a costly and
cumbersome process to manage. AT&T has a simple and cost effective
solution which places the firewall and IDS capabilities in the cloud (not at
each end point), and mitigates those threats from the internet before they ever
reach your premise. Not only is this more cost effective, but it
can easily grow as your volumes grow, and the upgrades required over time are
all managed and supported by AT&T.

Compliance and regulatory issues are on the top of everyone’s mind these
days, and the requirements are constantly changing. AT&T
Consulting Services can help you by providing a security assessment of your
network, processes and policies. We can also perform vulnerability
assessments to help you identify potential security gaps, develop a new
security strategy, and determine architectural solutions to keep your
information and network secure.